COMM511 Secure Information Systems Module Overview - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

COMM511 Secure Information Systems Module Overview

Description:

Hacking. Viruses and Trojan Horses. User Authentication Technologies (1 week) Password systems. Token and Biometric approaches. User supervision and intrusion ... – PowerPoint PPT presentation

Number of Views:62
Avg rating:3.0/5.0
Slides: 12
Provided by: drsteven
Category:

less

Transcript and Presenter's Notes

Title: COMM511 Secure Information Systems Module Overview


1
COMM511Secure Information SystemsModule
Overview
  • Dr Steven Furnell
  • Network Research Group
  • University of Plymouth
  • Plymouth
  • United Kingdom

2
Introduction
  • General information
  • Module Aims and Objectives
  • Course structure
  • Assessment
  • Recommended reading.

3
Contact Details
  • Dr Steven Furnell
  • Mr Paul Dowland
  • Network Research Group
  • Rooms 504/505, Moneycentre Building
  • Extn. 3521 / 3520
  • E-mail stevef_at_jack.see.plym.ac.uk
  • pdowland_at_jack.see.plym.ac.uk

4
Aim of the module
  • To provide a thorough understanding of the
    theory and practical issues that are involved
    with secure systems and networks

from COMM511 module description
5
Module Delivery
11 Weekly Sessions Monday 11.00 -
12.00 Moneycentre Room 502 (hopefully!) Delive
ry shared between SF (6 weeks) and PD (5 weeks)
6
Syllabus coverage (SF)
  • Security Policy and Risk Analysis (2 weeks)
  • Introduction to security
  • System threats and vulnerabilities
  • Security guidelines and countermeasures
  • Approaches to Risk Analysis

Continued . . .
7
Syllabus coverage (SF)
  • Computer Crime and Abuse (3 weeks)
  • Computer Misuse Act
  • Hacking
  • Viruses and Trojan Horses
  • User Authentication Technologies (1 week)
  • Password systems
  • Token and Biometric approaches
  • User supervision and intrusion detection

8
Syllabus coverage (PD)
  • Cryptography (2 weeks)
  • Cipher systems
  • Algorithms, mechanisms and services
  • Authentication and key management
  • Digital signatures
  • Trusted Third Parties (TTP)

Continued . . .
9
Syllabus coverage (PD)
  • Internet Security (2 weeks)
  • Secure Socket Layer
  • Secure e-mail
  • Firewalls
  • WWW security issues
  • Operating System Security (1 week)
  • Comparison of security capabilities
  • Windows 95/98, Windows NT, Unix

10
Recommended Reading
  • Computer security reference book
  • Jackson, Hruska and Parker (eds). 1992.
  • Information security management. - BS-7799
  • British Standards Institution, 1995.
  • Opportunity makes a thief an analysis of
    computer abuse
  • Audit Commission, 1994.

11
Assessment
  • 30 Coursework / 70 Exam
  • Coursework
  • One assignment, to be set by SF
  • Submission before Christmas break
  • Examination
  • 2 hours
  • 3 out of 5 questions.
  • 3 questions from PD, 2 from SF
Write a Comment
User Comments (0)
About PowerShow.com